You already know how it goes. Post 3 unique keys on the comments and get you Challenge Solver Badge. Badges will be available until the first keygen/writeup is released. Please use the spoiler tag for keygens and writeups (unless you post them in a new topic).
This is an experiment so I hope it works fine. Let me know if you have any issue.
NOTE: You need to download the original image. Click in the image and download the one that pops up
(MD5:7b120c07d6beca086b7cc1d495a85359)
Found the location of the second hint… But I have literally no idea what to do with all that stuff… Is this at all possible on windows or am I barking up the wrong tree?
I’m sure it’s possible on Windows, but you will be limited to static analysis.
You are likely better off just doing it in *nix.
I will offer a couple hints, though:
Hint 1:
This is a crackme, so you are looking for a binary executable.
The first hint is a command that will give you the next layer of steganography.
Hint 2:
The second hint doesn’t come into play until you have an actual ELF file you can execute and examine.
Also, if anybody else had trouble extracting and converting a certain part of a certain file during the stego part of the challenge, here’s my (bad) solution (this is a much more spoilery hint!):
I installed Jeex, a hex editor, then viewed the second image in ASCII and copied it to a text file.
Then, I trimmed all the whitespace and the single character that isn’t part of that alphabet’s encoding and was able to decode it.
I wasn’t able to do this from the terminal, so if one of you wizards would like to pm me their one-liners for this part of the extraction, that would be awesome.